IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000f8efffea70, memory referenced
Arg2: 000000000000000f, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80483f767f7, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for cpuz149_x64.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: f8efffea70
BUGCHECK_P2: f
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80483f767f7
WRITE_ADDRESS: fffff804845733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000f8efffea70
CURRENT_IRQL: f
FAULTING_IP:
hal!HalpPciReadMmConfigUlong+7
fffff804`83f767f7 8902 mov dword ptr [rdx],eax
CPU_COUNT: 4
CPU_MHZ: c16
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: Corsair.Service.CpuIdRemote64.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-19-2020 22:38:48.0548
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffff8183268a0050 -- (.trap 0xffff8183268a0050)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000400d03 rbx=0000000000000000 rcx=fffff7e200221000
rdx=000000f8efffea70 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80483f767f7 rsp=ffff8183268a01e8 rbp=fffff7e200221000
r8=0000000000000070 r9=0000000000000070 r10=0000000000000000
r11=0000000000000012 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
hal!HalpPciReadMmConfigUlong+0x7:
fffff804`83f767f7 8902 mov dword ptr [rdx],eax ds:000000f8`efffea70=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff804841d33e9 to fffff804841c1510
STACK_TEXT:
ffff8183`2689ff08 fffff804`841d33e9 : 00000000`0000000a 000000f8`efffea70 00000000`0000000f 00000000`00000001 : nt!KeBugCheckEx
ffff8183`2689ff10 fffff804`841cf72b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8183`268a0050 fffff804`83f767f7 : fffff804`83f6088f ffff3c07`59625400 ffffa404`4bb8da90 ffff3c07`596254a0 : nt!KiPageFault+0x46b
ffff8183`268a01e8 fffff804`83f6088f : ffff3c07`59625400 ffffa404`4bb8da90 ffff3c07`596254a0 00000000`00000000 : hal!HalpPciReadMmConfigUlong+0x7
ffff8183`268a01f0 fffff804`83f606ea : 00000000`00000012 00000000`00000004 00000000`00000070 00000000`00000000 : hal!HalpPCIPerformConfigAccess+0x5b
ffff8183`268a0220 fffff804`83f605c2 : 00000000`00000060 00000000`00000004 00000000`00000000 000000f8`efffea70 : hal!HalpPciAccessMmConfigSpace+0x82
ffff8183`268a0260 fffff804`83f64336 : 00000000`00000060 00000000`00000012 000000f8`efffea70 00000000`00000004 : hal!HalpPCIConfig+0xa2
ffff8183`268a02e0 fffff804`83f642b1 : 00000000`00000060 00000000`00000070 00000000`00000000 00000000`00000004 : hal!HalpReadPCIConfig+0x5a
ffff8183`268a0330 fffff804`83f641b1 : 00000000`00000002 fffff804`840476a7 00000000`00000000 ffffa404`00000000 : hal!HalpGetPCIData+0xf1
ffff8183`268a0400 fffff804`80c24345 : 00000000`00000001 00000000`00000000 00000000`00000002 fffff804`8446a400 : hal!HalGetBusDataByOffset+0x41
ffff8183`268a0440 00000000`00000001 : 00000000`00000000 00000000`00000002 fffff804`8446a400 00000000`00000070 : cpuz149_x64+0x4345
ffff8183`268a0448 00000000`00000000 : 00000000`00000002 fffff804`8446a400 00000000`00000070 ffff8183`00000004 : 0x1
THREAD_SHA1_HASH_MOD_FUNC: b4695a82e8b7d192170b1b4c438a6a6b7ef76d94
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f91e0e0852119dde0aa16d48eff98880b3ba0722
THREAD_SHA1_HASH_MOD: 62da28c754c7dd30131d445c1f3756d0a684acf9
FOLLOWUP_IP:
cpuz149_x64+4345
fffff804`80c24345 41894500 mov dword ptr [r13],eax
FAULT_INSTR_CODE: 458941
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: cpuz149_x64+4345
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cpuz149_x64
IMAGE_NAME: cpuz149_x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5d6589cf
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4345
FAILURE_BUCKET_ID: AV_cpuz149_x64!unknown_function
BUCKET_ID: AV_cpuz149_x64!unknown_function
PRIMARY_PROBLEM_CLASS: AV_cpuz149_x64!unknown_function
TARGET_TIME: 2020-02-19T18:27:48.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3521
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_cpuz149_x64!unknown_function
FAILURE_ID_HASH: {6630e516-5929-09aa-311a-f35c4b67545e}
Followup: MachineOwner
---------